Networks 3. 2015 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content



Similar documents
LESSON Networking Fundamentals. Understand TCP/IP

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Technical Support Information Belkin internal use only

Mathatma Gandhi University

Data Communication Networks and Converged Networks

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Transport and Network Layer

Connecting with Computer Science, 2e. Chapter 5 The Internet

Network Layers. CSC358 - Introduction to Computer Networks

Cisco Configuring Commonly Used IP ACLs

Computer Networks CS321

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Using IPM to Measure Network Performance

Communications and Networking

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Multi-Homing Dual WAN Firewall Router

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Overview of Computer Networks

Troubleshooting Tools

Basic Network Configuration

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Application. Transport. Network. Data Link. Physical. Network Layers. Goal

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS101 Lecture 19: Internetworking. What You ll Learn Today

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Networking Basics and Network Security

Proxy Server, Network Address Translator, Firewall. Proxy Server

UPPER LAYER SWITCHING

EXPLORER. TFT Filter CONFIGURATION

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Terminology. Internet Addressing System

Computer Networks/DV2 Lab

Internet Control Protocols Reading: Chapter 3

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

Network Configuration Settings

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Lab - Observing DNS Resolution

CHAPTER 0 INTRODUCTION TO TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Introduction to Network Operating Systems

Computer Networks - CS132/EECS148 - Spring

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

Fundamentals of UNIX Lab Networking Commands (Estimated time: 45 min.)

Internet Protocol version 4 Part I

Chakchai So-In, Ph.D.

TCP/IP, Addressing and Services

How To Design A Layered Network In A Computer Network

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

Networks 2. Gabriela Ochoa University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

CS3250 Distributed Systems

Layered Architectures and Applications

Internet Concepts. What is a Network?

Ethernet. Ethernet. Network Devices

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

The OSI and TCP/IP Models. Lesson 2

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Internetworking and IP Address

Computer Networks CCNA Module 1

Networking Test 4 Study Guide

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

BASIC ANALYSIS OF TCP/IP NETWORKS

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Chapter 12 Supporting Network Address Translation (NAT)

Linux MDS Firewall Supplement

Using MIS 3e Chapter 6A Appendix

Unix System Administration

SSVP SIP School VoIP Professional Certification

Use Domain Name System and IP Version 6

Overview of TCP/IP. TCP/IP and Internet

EECS 489 Winter 2010 Midterm Exam

Domain Name System (DNS)

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

allow all such packets? While outgoing communications request information from a

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

01 - Introduction. Internet Technology. MSc in Communication Sciences Program in Technologies for Human Communication.

How do I get to

Network Pop Quiz 5 Brought to you by please visit our site!

Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1

Domain Name System (DNS) Services

Lab Configuring Access Policies and DMZ Settings

Step-by-Step Configuration

Transcription:

Networks 3 Lecture Networks 3/Slide 1 Content What is a communications protocol? Network protocols TCP/IP High-level protocols Firewalls Network addresses Host name IP address Domain name system (DNS) Lecture Networks 3/Slide 2 Page 1 1

What is a communication protocol? The word protocol is used in different fields (here some examples) Society: Etiquette: is a code of behaviour that delineates expectations. Politics: a formal agreement between nation states. Diplomacy: the etiquette of diplomacy and affairs of state. Science: Natural sc.: a procedural method for conducting experiments. Medicine: guidelines for medical treatment. Communications: A description of the rules computers must follow to communicate with each other. Defines the syntax, semantics and synchronization of communication. Can be implemented as hardware, software or both. Lecture Networks 3/Slide 3 What is TCP/IP? The communication protocol for communication between computers on the Internet Defines how electronic devices (like computers) should be connected to the Internet, and how data should be transmitted between them. TCP/IP stands for Transmission Control Protocol /Internet Protocol TCP/IP is a suite of protocols. Because of the heavy reliance on TCP and for historical reasons, the entire suite is referred to as TCP/IP Lecture Networks 3/Slide 4 Page 2 2

Inside TCP/IP Inside the TCP/IP standard there are several protocols for handling data communication: TCP (Transmission Control Protocol) communication between applications. UDP (User Datagram Protocol) simple communication between applications. Similar to TCP, but simpler and less reliable. IP (Internet Protocol) communication between computers. ICMP (Internet Control Message Protocol) for errors and statistics. DHCP (Dynamic Host Configuration Protocol) for dynamic addressing. Lecture Networks 3/Slide 5 Packet switching Messages are divided into fixed-sized, numbered packets; packets are individually routed to their destination, then reassembled. Packet: A unit of data sent across a network. Router: A network device that directs a packet between networks toward its final destination. Lecture Networks 3/Slide 6 Page 3 3

TCP/IP TCP- Transmission Control Protocol Used for transmission of data from an application to the network. Responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive. IP - Internet Protocol Takes care of the communication with other computers. Responsible for the sending and receiving data packets over the Internet. TCP/IP is TCP and IP working together Lecture Networks 3/Slide 7 IP routers When an IP packet is sent from a computer, it arrives at an IP router. The IP router is responsible for "routing" the packet to the correct destination, directly or via another router. The path the packet will follow might be different from other packets of the same communication. The router is responsible for the right addressing, depending on traffic volume, errors in the network, or other parameters. http://computer.howstuffworks.com/internet/basics/internet-infrastructure3.htm Ping: A program used to test whether a particular network computer is active and reachable. Try http://ping.eu/ping/ Traceroute: A program that shows the route a packet takes across the Internet. Try http://ping.eu/traceroute/ Lecture Networks 3/Slide 8 Page 4 4

Network protocols Network protocols are layered such that each one relies on the protocols that underlie it. Sometimes referred to as a protocol stack. UDP is an alternative protocol to TCP used primarily for establishing low-latency and loss tolerating connections between applications. Layering of key network protocols Lecture Networks 3/Slide 9 High-level protocols Other protocols build on TCP/IP protocol suite Simple Mail Transfer Protocol (SMTP) used to specify transfer of electronic mail. File Transfer Protocol (FTP) allows a user to transfer files to and from another computer. Telnet used to log onto one computer from another. Hyper Text Transfer Protocol (http) allows exchange of Web documents. Which of these have you used? Lecture Networks 3/Slide 10 Page 5 5

TCP/IP Summary Messages (data) sent using this protocol are split up by TCP. Then sent using IP. Then re-assembled using TCP. Applications: e-mail & World Wide Web run on top of this system. Users Software Users Software Hardware Other protocols TCP IP physical link Hardware Lecture Networks 3/Slide 11 Firewalls Firewall: a gateway machine and its software that protects a network by filtering the traffic it allows. Access control policy: a set of rules established by an organization that specify what types of network communication are permitted and denied. A firewall protecting a LAN Lecture Networks 3/Slide 12 Page 6 6

Network addresses Every computer connected to the Internet has a unique identity. You can refer to any inter-connected machine in two ways, by its IP address: for computer use (sequence of numbers). Host name: for human use (sequence of readable words separated by dots). Example: shilling.cs.stir.ac.uk The internet Domain Name Service (DNS) translate host names into equivalent IP addresses and vice versa, as needed by various Internet programs. Find the IP address of your machine: type ipconfig in Command Prompt window. An IP & domain checker: http://ipinfo.info/html/ip_checker.php Lecture Networks 3/Slide 13 IP address Every computer connected to the Internet is identified by a unique four-part string, known as its Internet Protocol (IP) address. It consists of four numbers (each between 0 and 255) separated by dots. Example: 148.78.250.12. In computer terms, TCP/IP uses 32 bits addressing. One byte is 8 bits. TCP/IP uses 4 bytes. One byte can contain 256 different values: 00000000, 00000001, 00000010, 00000011, 00000100, 00000101, 00000110, 00000111, 00001000...and all the way up to 11111111. IP address: stored in 4 bytes Lecture Networks 3/Slide 14 Page 7 7

Domain names The Domain Name System (DNS) is a method of providing the convenience of names, and ensuring that each computer has a unique name. A domain is a grouping of computers. Domains have names. The components of domain names are separated by full stops: stir.ac.uk cs.stir.ac.uk src.doc.ic.ac.uk As you work right to left, the domains get smaller, and eventually may identify a single computer: shilling. cs. stir. ac.uk Computer Area Place Type of institution Country Lecture Networks 3/Slide 15 The Domain Name System, graphically uk co co ic ac stir gov cs ic: Imperial College, which is at the same level as stir. Both are in the ac (academic) domain. gov (government), co (commercial) are at the same level as ac. shilling Lecture Networks 3/Slide 16 Page 8 8

Domain name system Top-level domains, including some relatively new ones Lecture Networks 3/Slide 17 Domain name system Organizations based in countries other than the United States use a top-level domain that corresponds to their twoletter country codes Domain name system (DNS) A distributed system for managing hostname resolution Domain name server A computer that attempts to translate a hostname into an IP address Some of the top-level domain names based on country codes Lecture Networks 3/Slide 18 Page 9 9

Address resolution mechanism The resolution process makes a sequence of queries starting with the right-most (top-level) domain label. It starts with a query to one of the root servers to find the server authoritative for the top-level domain. The obtained top-level domain server is queried for the address of a DNS server authoritative for the second-level domain. Iteratively, each domain name label is used to query the resulting server of the previous step until the IP address of the host name is returned (see an illustration for www.wikipedia.org). In practice caching is used in DNS servers to off-load the root servers. Lecture Networks 3/Slide 19 Domain names and IP addresses Allocation of IP addresses is done by Globally, the Internet Corporation for Assigned Names and Numbers / Internet Assigned Numbers Authority (ICANN/IANA) Regionally, by 5 regional Internet registries: AfriNIC (African Network Information Centre) ARIN (American Registry for Internet Numbers) APNIC (Asia Pacific Network Information Centre) LACNIC (Latin America and Caribbean Network Information Centre) RIPE (Réseaux IP Européens) We're running out of IP addresses: there are only (only!) about four billion different IP addresses. IP Version 6 is slowly being rolled out. V6 uses IP addresses that are twice the length of existing ones, so the number of different IP addresses will be 340,282,366,920,938,463,463,374,607,431,768,211,456 (= 2 64 ) Maybe (?) this will be enough to give every computer (and TV, phone, washing machine, watch, car, ATM,... ) in the world a different IP address. Lecture Networks 3/Slide 20 Page 10 10

Summary Network protocols TCP/IP High-level protocols Firewalls Network addresses Host name IP addresses Domain name system (DNS) Lecture Networks 3/Slide 21 Networks - References N. Dell & J. Lewis, Computer Science Illuminated, Chapters 15-16 H.L Capron & J.A. Jhonson, Computers Tools for an information Age, Chapters 7-8 w3schools.com - TCP/IP http://www.w3schools.com/tcpip/tcpip_intro.asp How Stuff Works - Internet Infrastructure: http://computer.howstuffworks.com/internet-infrastructure.htm Lecture Networks 3/Slide 22 Page 11 11